Role in IT decision-making process:Align Business & IT GoalsCreate IT StrategyDetermine IT NeedsManage Vendor RelationshipsEvaluate/Specify Brands or VendorsOther RoleAuthorize PurchasesNot Involved

Work Phone:

Company:

Company Size:

Industry:

Street Address

City:

Zip/postal code

State/Province:

Country:

Occasionally, we send subscribers special offers from select partners. Would you like to receive these special partner offers via e-mail?YesNo

Your registration with Eweek will include the following free email newsletter(s):News & Views

By submitting your wireless number, you agree that eWEEK, its related properties, and vendor partners providing content you view may contact you using contact center technology. Your consent is not required to view content or use site features.

By clicking on the "Register" button below, I agree that I have carefully read the Terms of Service and the Privacy Policy and I agree to be legally bound by all such terms.

Kaminsky (left), a well-known researcher who helped with the Sony rootkit investigation, says the advertising servers are impersonating, via DNS, hostnames within trademarked domains. "We have determined that these injected servers are, in fact, vulnerable to cross-site scripting attacks. Since these servers are being injected into your trademarked domains, their vulnerability can be used to attack your users and your sites," Kaminsky said, identifying EarthLink, Verizon and Quest among the ISPs.

1. Arbitrary cookie retrieval. Any Web page on the Internet can retrieve all non-HTTP-only cookies from domains.

2. Fake site injection. A victim can be directed to "server2.www.realsite.com" or "server3.www.realsite.com," which will appear to be a host in a trademarked domain. We believe any phishing attempts from this perfect-address spoofed subdomain are more likely to be successful.

3. Full-page compromise. A victim can be directed to an actual HTTP site, with all logged-in credentials, and a hacker's attack page will still be able to fully manipulate the target site as if we ourselves were the victim. Note, while we cannot attack HTTPS resources, we can prevent upgrade from HTTP to HTTPS. This may affect any shopping carts within your sites.

In a statement sent to eWEEK's SecurityWatch ahead of his talk, Kaminsky said:

"We believe this behavior is illustrative of the risks of violating Network Neutrality. Indeed, it is our sense that the HTTP web becomes insecurable if man-in-the-middle attacks are monetized by providers -- if we don't know what bits are going to reach the client, how can we control for flaws in those bits?"

Kaminsky, who worked for penetration testing and consulting firm IOActive, said he was able to use a vulnerability in the search injection framework of Earthlink to partially compromise Microsoft's Live.com, eBay, the Associated Press, MySpace, Facebook and every other resource on the Web.

"Whereas Comcast outsources the operation of at least parts of their Washington network to EarthLink (who themselves are using equipment from a company called BareFruit), this is potentially affecting millions of users," he added.